Hi Anna,
Thank you for sharing your details!
After looking into this, IIS accepting Transfer‑Encoding: chunked on HTTP/1.1 requests is expected, standards‑compliant behavior and isn’t a known vulnerability in IIS or ASMX. I couldn't find any Microsoft documentation or security advisory that treats this as a confirmed IIS issue.
Security scanners typically flag this as a potential HTTP request smuggling risk when requests pass through intermediaries (such as WAFs, proxies, or CDNs) that may interpret requests differently. In this case, the scan is detecting capability, not an active issue or misconfiguration.
From a practical standpoint, this becomes a risk‑management decision. If the IIS site is behind intermediaries and you want to reduce ambiguity or satisfy scan requirements, blocking or limiting the Transfer‑Encoding request header via IIS Request Filtering is a reasonable hardening step like you suggested. This affects only incoming chunked request bodies and does not impact IIS response chunking.
If no intermediaries are involved and request parsing is consistent end‑to‑end, you can document this as a false positive and accept the risk. Since ASMX clients rarely rely on chunked request uploads, it’s still worth validating client behavior before enforcing any restriction.
Hope this helps!